Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing

    Shasha Zhao1,2,3,*, Huanwen Yan1,2, Qifeng Lin1,2, Xiangnan Feng1,2, He Chen1,2, Dengyin Zhang1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1135-1156, 2024, DOI:10.32604/cmc.2024.045660

    Abstract Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment. Short execution time and low load imbalance may be the challenges for some algorithms in resource scheduling scenarios. In this work, the Hierarchical Particle Swarm Optimization-Evolutionary Artificial Bee Colony Algorithm (HPSO-EABC) has been proposed, which hybrids our presented Evolutionary Artificial Bee Colony (EABC), and Hierarchical Particle Swarm Optimization (HPSO) algorithm. The HPSO-EABC algorithm incorporates both the advantages of the HPSO and the EABC algorithm. Comprehensive testing including evaluations of algorithm convergence speed, resource execution time, load balancing,… More >

  • Open Access

    ARTICLE

    Optimal Location and Sizing of Multi-Resource Distributed Generator Based on Multi-Objective Artificial Bee Colony Algorithm

    Qiangfei Cao1, Huilai Wang2, Zijia Hui1, Lingyun Chen2,*

    Energy Engineering, Vol.121, No.2, pp. 499-521, 2024, DOI:10.32604/ee.2023.042702

    Abstract Distribution generation (DG) technology based on a variety of renewable energy technologies has developed rapidly. A large number of multi-type DG are connected to the distribution network (DN), resulting in a decline in the stability of DN operation. It is urgent to find a method that can effectively connect multi-energy DG to DN. photovoltaic (PV), wind power generation (WPG), fuel cell (FC), and micro gas turbine (MGT) are considered in this paper. A multi-objective optimization model was established based on the life cycle cost (LCC) of DG, voltage quality, voltage fluctuation, system network loss, power deviation of the tie-line, DG… More >

  • Open Access

    ARTICLE

    An Improved Lung Cancer Segmentation Based on Nature-Inspired Optimization Approaches

    Shazia Shamas1, Surya Narayan Panda1,*, Ishu Sharma1,*, Kalpna Guleria1, Aman Singh2,3,4, Ahmad Ali AlZubi5, Mallak Ahmad AlZubi6

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1051-1075, 2024, DOI:10.32604/cmes.2023.030712

    Abstract The distinction and precise identification of tumor nodules are crucial for timely lung cancer diagnosis and planning intervention. This research work addresses the major issues pertaining to the field of medical image processing while focusing on lung cancer Computed Tomography (CT) images. In this context, the paper proposes an improved lung cancer segmentation technique based on the strengths of nature-inspired approaches. The better resolution of CT is exploited to distinguish healthy subjects from those who have lung cancer. In this process, the visual challenges of the K-means are addressed with the integration of four nature-inspired swarm intelligent techniques. The techniques… More >

  • Open Access

    ARTICLE

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    Yazeed Yasin Ghadi1, Mohammed S. Alshehri2, Sultan Almakdi2, Oumaima Saidani3,*, Nazik Alturki3, Fawad Masood4, Muhammad Shahbaz Khan5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 781-797, 2023, DOI:10.32604/cmc.2023.042777

    Abstract Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Substitution-box (S-box) often playing a pivotal role in many symmetric encryption systems. This study introduces an innovative approach to creating S-boxes for encryption algorithms. The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme. The nonlinearity measure of the proposed S-boxes is 112. These qualities significantly enhance its resistance to common cryptographic attacks, ensuring high image data security. Furthermore, to assess the robustness of the S-boxes, an encryption system… More >

  • Open Access

    ARTICLE

    HybridHR-Net: Action Recognition in Video Sequences Using Optimal Deep Learning Fusion Assisted Framework

    Muhammad Naeem Akbar1,*, Seemab Khan2, Muhammad Umar Farooq1, Majed Alhaisoni3, Usman Tariq4, Muhammad Usman Akram1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3275-3295, 2023, DOI:10.32604/cmc.2023.039289

    Abstract The combination of spatiotemporal videos and essential features can improve the performance of human action recognition (HAR); however, the individual type of features usually degrades the performance due to similar actions and complex backgrounds. The deep convolutional neural network has improved performance in recent years for several computer vision applications due to its spatial information. This article proposes a new framework called for video surveillance human action recognition dubbed HybridHR-Net. On a few selected datasets, deep transfer learning is used to pre-trained the EfficientNet-b0 deep learning model. Bayesian optimization is employed for the tuning of hyperparameters of the fine-tuned deep… More >

  • Open Access

    ARTICLE

    An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm

    Huaixi Xing*, Qinghua Xing

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2685-2705, 2023, DOI:10.32604/cmc.2023.036223

    Abstract With the advancement of combat equipment technology and combat concepts, new requirements have been put forward for air defense operations during a group target attack. To achieve high-efficiency and low-loss defensive operations, a reasonable air defense weapon assignment strategy is a key step. In this paper, a multi-objective and multi-constraints weapon target assignment (WTA) model is established that aims to minimize the defensive resource loss, minimize total weapon consumption, and minimize the target residual effectiveness. An optimization framework of air defense weapon mission scheduling based on the multi-objective artificial bee colony (MOABC) algorithm is proposed. The solution for point-to-point saturated… More >

  • Open Access

    ARTICLE

    Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network

    Hang Yang1,2,*, Xunbo Li1, Witold Pedrycz2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1531-1551, 2023, DOI:10.32604/iasc.2023.039256

    Abstract Energy supply is one of the most critical challenges of wireless sensor networks (WSNs) and industrial wireless sensor networks (IWSNs). While research on coverage optimization problem (COP) centers on the network’s monitoring coverage, this research focuses on the power banks’ energy supply coverage. The study of 2-D and 3-D spaces is typical in IWSN, with the realistic environment being more complex with obstacles (i.e., machines). A 3-D surface is the field of interest (FOI) in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN. The hybrid power bank deployment model is… More >

  • Open Access

    ARTICLE

    Intelligent Financial Fraud Detection Using Artificial Bee Colony Optimization Based Recurrent Neural Network

    T. Karthikeyan1,*, M. Govindarajan1, V. Vijayakumar2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1483-1498, 2023, DOI:10.32604/iasc.2023.037606

    Abstract Frauds don’t follow any recurring patterns. They require the use of unsupervised learning since their behaviour is continually changing. Fraudsters have access to the most recent technology, which gives them the ability to defraud people through online transactions. Fraudsters make assumptions about consumers’ routine behaviour, and fraud develops swiftly. Unsupervised learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other techniques. Building a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization patterns with a focus on fraud situations that cannot… More >

  • Open Access

    ARTICLE

    Facial Emotion Recognition Using Swarm Optimized Multi-Dimensional DeepNets with Losses Calculated by Cross Entropy Function

    A. N. Arun1,*, P. Maheswaravenkatesh2, T. Jayasankar2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3285-3301, 2023, DOI:10.32604/csse.2023.035356

    Abstract The human face forms a canvas wherein various non-verbal expressions are communicated. These expressional cues and verbal communication represent the accurate perception of the actual intent. In many cases, a person may present an outward expression that might differ from the genuine emotion or the feeling that the person experiences. Even when people try to hide these emotions, the real emotions that are internally felt might reflect as facial expressions in the form of micro expressions. These micro expressions cannot be masked and reflect the actual emotional state of a person under study. Such micro expressions are on display for… More >

  • Open Access

    ARTICLE

    Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition

    Tariq Ahamed Ahanger1,*, Fadl Dahan2,3, Usman Tariq1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2429-2445, 2023, DOI:10.32604/csse.2023.037692

    Abstract In the Internet of Things (IoT), the users have complex needs, and the Web Service Composition (WSC) was introduced to address these needs. The WSC’s main objective is to search for the optimal combination of web services in response to the user needs and the level of Quality of Services (QoS) constraints. The challenge of this problem is the huge number of web services that achieve similar functionality with different levels of QoS constraints. In this paper, we introduce an extension of our previous works on the Artificial Bee Colony (ABC) and Bat Algorithm (BA). A new hybrid algorithm was… More >

Displaying 1-10 on page 1 of 25. Per Page